Answer:
Boor sequence
Explanation:
Help me why did my desktop erase every app I need that please
Answer:
Your computer is affected by a polymorphic or trojan horse virus, so install avast antivirus. Set your computer into safe mode, then open the antivirus
Answer:
your pc has virus
Explanation:
Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings.
Answer:
memo
Explanation:
Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings
Express your opinion on whether a successful business analyst can be a good programmer. support your answers with reason
1. Answer the following questions: a. What are the different types of number system? Name them.
Answer:
binary,decimal, hexadecimal and octal number system
Which of these are part of the CPU?
O peripheral
O HDMI cord
O core
O keyboard
Laser printer use a special powdered ink called?
What does RoHS stand for and why is RoHS compliance important?
Answer:
It stands for Restriction of Certain Hazardous Substances.
Web search says it is important because,
RoHS compliance dovetails into WEEE by reducing the amount of hazardous chemicals used in electronic manufacture. Put another way, RoHS regulates the hazardous substances used in electrical and electronic equipment, while WEEE regulates the disposal of this same equipment.
Explanation:
[10 points] Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of digits.
Answer:
I am going to write the program using BASIC PROGRAMMING
Explanation:
10 PROGRAM TO CALCULATE SUM OF DIGITS
20 INPUT B,H,T,G
30 LET Y = B+H+T+G
40 PRINT Y
DO THIS ON BASIC PROGRAMMING AND YOU HAVE YOUR PROGRAM
You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.
Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients
configure network access policies on the RADIUS server
Explanation:
which of the following would not transmit signals from one point to another? a. telephone line. b. modem. c. fibre optics. d. coaxial cable
Answer:
b
modem
Explanation:
modem is used to receive signals not transmit
monitor is hard copy output device??
false
true
Answer:
false
Explanation:
monitor is an output device but not hard copy. Hard copy is paper
tiền tệ ra đời là kết quả
bruuh, wht is this man saying
Which computer can be used where there is no regular electricity?
Answer:
A mechanical computer
Explanation:
Created from gears and levers
Select the best answer for the ques
12. A business has a goal of communicating frequently with its customers to offer specials and increase sales. What element should it consider adding to its website
O A. Database
O B. Payment system
O C. Calendar
O D. Mailing list opt-in
The element that should consider adding to its website is Mailing list opt-in. Option D is the correct answer.
Adding a mailing list opt-in to the website would allow the business to collect email addresses from customers who are interested in receiving updates, specials, and promotions.
By building a mailing list, the business can communicate frequently and directly with its customers, informing them about new products, exclusive offers, and other relevant information.
Having a mailing list opt-in provides several advantages. Firstly, it gives the business a direct channel of communication with customers, allowing them to reach a targeted audience interested in their products or services.
Secondly, it helps to increase sales by sending promotional emails and offers to the subscribers, which can encourage them to make purchases. Lastly, it enhances customer engagement and loyalty as customers feel connected to the business and stay informed about its latest offerings. Option D is the correct answer.
For such more question on element:
https://brainly.com/question/4966688
#SPJ8
You are working as a Solutions Architect in a large healthcare organization. You have many Auto Scaling Groups that you need to create. One requirement is that you need to reuse some software licenses and therefore need to use dedicated hosts on EC2 instances in your Auto Scaling Groups. What step must you take to meet this requirement
Answer:use launch template with your ASG
Explanation:
A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability and a patch is not available for it yet. Which of the following should the administrator do to mitigate this risk?
Options are :
A. Enable the host-based firewall on the Internet server
B. Enable HIPS to protect the server until the patch is released
C. Utilize WAF to restrict malicious activity to the Internet server
D. Downgrade the server and defer the new feature testing
Answer:
i think its C. Utilize WAF to restrict malicious activity to the Internet server
Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.
Answer:
Use an encryption algorithm
Explanation:
An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.
Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.
if ur computer is runing slowly what is most likey to slove the problem
What is the role of memory in a computer
Answer:
Computer random access memory (RAM) is one of the most important components in determining your system's performance. RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is actively using so that it can be accessed quickly.
Which of the following are characteristics of centralized version control systems? Select 3 options.
A full copy of all project files is stored on each developer's computer.
Changes to the project are stored in a log file on each developer’s computer.
It allows many developers to work on the same project from anywhere at the same time.
Project files are maintained in a central repository.
The process may require file locking, depending on file type.
Answer:
It allows many developers to work on the same project from anywhere at the same time
Project files are maintained in a central repository
The process may require file locking, depending on file type
Explanation:
The two main types of version control system are the centralized version control system and distributed control system
The centralized version control system is a control system whereby all programmers work on and make their individual changes to a single single copy of the project stored and maintained in a central repository, such as a server
In order to solve the problem of several developers working on each others work simultaneously, a centralized version control system makes use of the lock-modify-unlock model
The three options are therefore;
It allows many developers to work on the same project from anywhere at the same time
Project files are maintained in a central repository
The process may require file locking, depending on file type
Answer:c d e
Explanation:
What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online
Answer:
any program designed to do harm.
Explanation:
Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.
express in Qbasic assignment statement
[tex]v = \ \sqrt{t} ^{2} - 4s \div {d}^{4} [/tex]
[tex]K = {8}{x} ^{3} - {2}{y}^{ 6} \div {5}{d}+ {e}^{4} [/tex]
Answer:
v = sqr(t^(1/2)) - 4 * s / d^4
K = 8 * x^3 - 2 * y^6 / 5 * d + e^4
Explanation:
Given
[tex]v = \ \sqrt{t} ^{2} - 4s \div {d}^{4}[/tex]
[tex]K = {8}{x}^{3} - {2}{y}^{ 6} \div {5}{d}+ {e}^{4}[/tex]
Required
The equivalent in Q Basic
To solve this, we use the following rules:
+ , - and * are written as + , - and *
[tex]\div[/tex] is written as /
^ stands for raise to power
SQR is used for square
^(1/2) stands for square root.
So, the equivalents of the above statements are:
v = SQR(t^(1/2)) - 4 * s / d^4
K = 8 * x^3 - 2 * y^6 / 5 * d + e^4
Explain What Peer to Peer Networking is.
Answer:
peer to peer networking is like when joining together works
Tests of controls in an advanced computer system Can be performed using actual transactions or simulated transactions. Can be performed using only actual transactions because testing of simulated transactions is of no consequence. Is inadvisable because they may distort the evidence in master files. Is impracticable because many procedures within the computer processing activity leave no visible evidence of having been performed.
Answer:
Can be performed using actual transactions or simulated transactions.
Explanation:
Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.
Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.
In an advanced computer system, test of controls can be performed using actual transactions or simulated transactions.
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future
Answer:
The organization could make it so that specific websutes that seem fake/unsafe are not accessible to the users. For example, downloading an extension into all the devices, that blocks these malicious websites (uBlock Origin)
Plz help help help
What was the first electromechanical digital computer?
For your kind information I would like to tell you that don't search on internet because it will show ENIAC and that is not the answer the answeris may be ABC or MARK I. I am just confused, Please help me
Explanation:
For your kind information the answer of the question is MARK I.
Answer:
What was the first electromechanical digital computer?
=⟩ Mark I was the first electromechanical digital computer.
Hope it helpful to you
ou have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use
Server and network is 2 different things, just put the server on a different network. ;) duh
Explanation:
You upgrade your office graphics workstation with more memory. You replace two of the four inexpensive memory chips with expensive memory designed for workstations but now the system occasionally has memory issues. What could be the problem
Answer:
the two other inexpensive memory chips don't calibrate with the two expensive memory chips because they're not the same
Explanation:
What contains programming statement written in VB?
Answer:
A statement in Visual Basic is a complete instruction. It can contain keywords, operators, variables, constants, and expressions. Each statement belongs to one of the following three categories: Declaration statements, which name a variable, constant, or procedure and can also specify a data type.
PLS HELP ME WITH MY PYTHON HW
Answer:
name=input('What is your name?')
age=input('What is your age?')
school=input('What is your school?')
print('Hi '+ name +', you are '+ age +', and you go to '+school+'.')
age=int(input('What is your age?'))
if age > 10:
print('You are a teenager')
for x in range(10):
print(name)
country='United States or America'
print(country[17:24])
a_list = [0, 2, 4, 8]
maximum = max(a_list)
print(maximum)
minimum = min(a_list)
print(minimum)
numbers = [1, 3, 4, 2]
numbers.sort()
print(numbers)